Components such as applications, databases, web servers, directories, and operating systems rely mostly on built-in security features. But passwords and privileges are hardly enough, considering that many users have elevated privileges and fail to follow established corporate procedures.
You Adequately Protecting Your IT Infrastructure Components Inside the Firewall? Originally published - August 16, 2006 Networks are commonly protected by specialized software such as firewalls, antivirus, and network access control products to prevent unauthorized access and activity. Yet other IT infrastructure components, including applications, databases, web servers, directories, and operating systems rely mostly on the security mechanisms that come as part of the product’s built-in feature set.